VOW: Verifiable and Oblivious Watermark Detection for Large Language Models

Authors: Xiaokun Luan, Yihao Zhang, Pengcheng Su, Feiran Lei, Meng Sun | Published: 2026-04-30

Low Rank Adaptation for Adversarial Perturbation

Authors: Han Liu, Shanghao Shi, Yevgeniy Vorobeychik, Chongjie Zhang, Ning Zhang | Published: 2026-04-30

Security Attack and Defense Strategies for Autonomous Agent Frameworks: A Layered Review with OpenClaw as a Case Study

Authors: Luyao Xu, Xiang Chen | Published: 2026-04-30

AdaBFL: Multi-Layer Defensive Adaptive Aggregation for Bzantine-Robust Federated Learning

Authors: Zehui Tang, Yuchen Liu, Feihu Huang | Published: 2026-04-30

Toward Autonomous SOC Operations: End-to-End LLM Framework for Threat Detection, Query Generation, and Resolution in Security Operations

Authors: Md Hasan Saju, Akramul Azim | Published: 2026-04-30

REBENCH: A Procedural, Fair-by-Construction Benchmark for LLMs on Stripped-Binary Types and Names (Extended Version)

Authors: Jun Yeon Won, Xin Jin, Shiqing Ma, Zhiqiang Lin | Published: 2026-04-30

PRAG End-to-End Privacy-Preserving Retrieval-Augmented Generation

Authors: Zhijun Li, Minghui Xu, Huayi Qi, Wenxuan Yu, Tingchuang Zhang, Qiao Zhang, GuangYong Shang, Zhen Ma, Xiuzhen Cheng | Published: 2026-04-29

SafeReview: Defending LLM-based Review Systems Against Adversarial Hidden Prompts

Authors: Yuan Xin, Yixuan Weng, Minjun Zhu, Ying Ling, Chengwei Qin, Michael Hahn, Michael Backes, Yue Zhang, Linyi Yang | Published: 2026-04-29

Quantamination: Dynamic Quantization Leaks Your Data Across the Batch

Authors: Hanna Foerster, Ilia Shumailov, Cheng Zhang, Yiren Zhao, Jamie Hayes, Robert Mullins | Published: 2026-04-29

Towards Agentic Investigation of Security Alerts

Authors: Even Eilertsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2026-04-28